Security Advisories (13)
CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CVE-2010-4802 (2011-05-03)

Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies.  An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

NAME

Mojo::Content - HTTP 1.1 Content Base Class

SYNOPSIS

use base 'Mojo::Content';

DESCRIPTION

Mojo::Content is an abstract base class for HTTP 1.1 content as described in RFC 2616.

ATTRIBUTES

Mojo::Content implements the following attributes.

body_cb

my $cb = $content->body_cb;

$counter = 1;
$content = $content->body_cb(sub {
    my $self  = shift;
    my $chunk = '';
    $chunk    = "hello world!" if $counter == 1;
    $chunk    = "hello world2!\n\n" if $counter == 2;
    $counter++;
    return $chunk;
});

Content generator callback.

buffer

my $buffer = $content->buffer;
$content   = $content->buffer(Mojo::ByteStream->new);

Parser buffer.

filter

my $filter = $content->filter;
$content   = $content->filter(Mojo::Filter::Chunked->new);

Input filter.

filter_buffer

my $filter_buffer = $content->filter_buffer;
$content          = $content->filter_buffer(Mojo::ByteStream->new);

Input buffer for filtering.

headers

my $headers = $content->headers;
$content    = $content->headers(Mojo::Headers->new);

The headers.

relaxed

my $relaxed = $content->relaxed;
$content    = $content->relaxed(1);

Activate relaxed filtering for HTTP 0.9.

raw_header_size

my $size = $content->raw_header_size;

Raw size of headers in bytes.

METHODS

Mojo::Content inherits all methods from Mojo::Base and implements the following new ones.

body_contains

my $found = $content->body_contains('foo bar baz');

Check if content contains a specific string.

body_size

my $size = $content->body_size;

Content size in bytes.

build_body

my $string = $content->build_body;

Render whole body.

build_headers

my $string = $content->build_headers;

Render all headers.

generate_body_chunk

my $chunk = $content->generate_body_chunk(0);

Generate content from body_cb.

get_body_chunk

my $chunk = $content->get_body_chunk(0);

Get a chunk of content starting from a specfic position.

get_header_chunk

my $chunk = $content->get_header_chunk(13);

Get a chunk of the headers starting from a specfic position.

has_leftovers

my $leftovers = $content->has_leftovers;

Check if there are leftovers in the buffer.

header_size

my $size = $content->header_size;

Size of headers in bytes.

is_chunked

my $chunked = $content->is_chunked;

Chunked transfer encoding.

is_done

my $done = $content->is_done;

Check if parser is done.

is_multipart

my $multipart = $content->is_multipart;

Multipart content.

is_parsing_body

my $body = $content->is_parsing_body;

Check if body parsing started yet.

leftovers

my $bytes = $content->leftovers;

Leftovers for next HTTP message in buffer.

parse

$content = $content->parse("Content-Length: 12\r\n\r\nHello World!");

Parse content.

parse_body

$content = $content->parse_body("Hi!");

Parse body.

parse_body_once

$content = $content->parse_body_once("Hi!");

Parse body once.

parse_until_body

$content = $content->parse_until_body(
    "Content-Length: 12\r\n\r\nHello World!"
);

Parse and stop after headers.

raw_body_size

my $size = $content->raw_body_size;

Raw size of body in bytes.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.